mistymntncop.bsky.social's Avatar

mistymntncop.bsky.social

@mistymntncop

36
Followers
83
Following
21
Posts
26.08.2023
Joined
Posts Following

Latest posts by mistymntncop.bsky.social @mistymntncop

Exploit and mini writeup for CVE-2025-5419.
github.com/mistymntncop...

25.08.2025 08:06 👍 2 🔁 1 💬 0 📌 0

Thank you :) !! Alot of ppl will appreciate it for sure.

17.05.2025 12:24 👍 0 🔁 0 💬 0 📌 0

Could you please leave the sold items up for a week so that us latecomers can see the full list of items sold for that week :) ? 🙏

17.05.2025 06:23 👍 1 🔁 0 💬 1 📌 0

My writeup for CVE-2024-7971. Just a POC. Let me know if u have any questions.
github.com/mistymntncop...

12.04.2025 23:51 👍 3 🔁 3 💬 0 📌 0
Preview
CVE-2024-0519 notes GitHub Gist: instantly share code, notes, and snippets.

CVE Cold Case. Isn't it crazy that even after a year we basically know nothing about the V8 ITW CVE-2024-0519. How is the property fast deletion path useful? Some minor notes about it here:
gist.github.com/mistymntncop...

14.01.2025 06:47 👍 1 🔁 0 💬 0 📌 0

Congrats Ben and Alex :). So what v8 CVE was it :) ?

09.01.2025 23:57 👍 0 🔁 0 💬 0 📌 0

Huak Tuah's influence on the culture is immeasurable 😔

09.12.2024 22:22 👍 1 🔁 0 💬 0 📌 0

AsyncFreeSnowWhite - a Disney story.

05.12.2024 06:34 👍 0 🔁 0 💬 0 📌 0

In Spidermonkey is there a way of immediately creating an object on the Tenured heap without having to send it their via gc ?

02.12.2024 23:23 👍 0 🔁 0 💬 0 📌 0
Chrome Internal JavaScript Object Access Via Origin Trials ≈ Packet Storm Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers

Funily enough Glazunov posted a very similar issue but i completely missed that it was similiar to CVE-2023-2033. packetstormsecurity.com/files/173131...

01.12.2024 01:26 👍 0 🔁 0 💬 0 📌 0

Before its public release my attempt at reversing CVE-2023-2033 was a failure. I got close in that i identified there was some difference in behavior between AccessorInfo and AccessorPair but I got lost. I didn't realize that you had to exploit re-entrancy

01.12.2024 01:26 👍 1 🔁 0 💬 1 📌 0

CVE-2024-0519 is the vuln that got away. The swiftness of the patch has resisted attempts at reversing it so far. We know you can create a object where unused property fields = 0 but in reality it is bigger. This is known in the comments. However doesnt seem useful. What is the initial primitive ?

30.11.2024 07:22 👍 0 🔁 0 💬 0 📌 0
Preview
GitHub - TheN00bBuilder/cve-2024-11477-writeup: CVE-2024-11477 7Zip Code Execution Writeup and Analysis CVE-2024-11477 7Zip Code Execution Writeup and Analysis - TheN00bBuilder/cve-2024-11477-writeup

Spent some time researching #CVE-2024-11477, the new #7zip CVE and made a writeup about my work on it. Let me know what you think! github.com/TheN00bBuild...

29.11.2024 06:33 👍 20 🔁 5 💬 1 📌 1
mozilla-central @ df7327d207f1681a7ba33a6778ad218f882322c2 Bug 1904442 - Remove GlobalTearDownObserver::mOwnerWindow. r=smaug

On 01 Jul 2024 the "mOwnerWindow" fields from GlobalTeardownObserver was removed. mozilla::dom::Animation inherits from GlobalTeardownObserver. This is important as it will affect the size of Animation and offset of the write.
hg.mozilla.org/mozilla-cent...

29.11.2024 05:56 👍 1 🔁 0 💬 0 📌 0

Indeed the Promise will be resolved at the end of the nsAutoMicroTask scope. While the setTimeout callback will be run when the event loop is pumped next. So the promise resolution seems better to me as its earlier.

28.11.2024 00:31 👍 0 🔁 0 💬 0 📌 0

Re: The ITW CVE-2024-9680 exploit. I don't understand the purpose of the XSLT stuff. Doesn't really seem necessary ? Or We're they using it as an alloc primitive ?

28.11.2024 00:17 👍 0 🔁 0 💬 0 📌 0

Re: CVE-2024-9680 - the use of setTimeout to call "getInfo" is an odd choice. Wouldn't just using the promise resolution itself be better ?

27.11.2024 23:56 👍 0 🔁 0 💬 1 📌 0

As we suspected the ITW exploit for CVE-2024-9680 was definitely inspired by CVE-2022-0609. Just look at the variable names and other choices - such as creating a Animation object via "animate" function instead of constructor, he check for "if (this.toString() == "[object Animation]")" too.

27.11.2024 00:02 👍 1 🔁 0 💬 0 📌 0
Preview
RomCom exploits Firefox and Windows zero days in the wild ESET Research details the analysis of a previously unknown vulnerability in Mozilla products exploited in the wild and another previously unknown Microsoft Windows vulnerability, combined in a zero-cl...

ESET's writeup on the latest ITW Firefox 0day
www.welivesecurity.com/en/eset-rese...

26.11.2024 12:13 👍 1 🔁 0 💬 0 📌 0
Chromium

It's earily similar to CVE-2022-0609 which was exploited ITW by North Korea :S.
issues.chromium.org/issues/40058...

19.11.2024 11:23 👍 0 🔁 0 💬 0 📌 0
Firefox Animation CVE-2024-9680 – Dimitri Fourny Personal website and computer security blog.

Dimitri Fourny's writeup on the latest Firefox ITW vuln CVE-2024-9680. A good old fashioned "I can free this thing in a callback UAF" - not as common in these modern type confusion dayze.
dimitrifourny.github.io/2024/11/14/f...

19.11.2024 11:22 👍 0 🔁 0 💬 1 📌 0

www.youtube.com/watch?v=W1LB...

01.01.2024 04:28 👍 0 🔁 0 💬 0 📌 0